Sophos (Schweiz) AG May 2012
|
|
- Francis Flynn
- 8 years ago
- Views:
Transcription
1 Sophos (Schweiz) AG May 2012
2 Agenda 08:30 Accueil 08:45 Sécurité complète et programme de partenariat 09:15 Update & Roadmap produits, avec une démonstration live du Sophos UTM V9 10:00 Pause café 10:15 Démonstration live - Sophos Mobile Security 10:45 Mobile Live Hacking 11:45 Apéro & Get-Together
3 Sophos Nous protégeons les entreprises depuis 25 ans 1 er éditeur européen de solutions de sécurité pour les entreprises Plus forte croissance des trois principaux éditeurs mondiaux de solution de protection des systèmes Croissance annuelle moyenne de 20% sur les quatre dernières années Plus de $400m de revenus Couverture mondiale et présence locale 100 millions d utilisateurs dans le monde employés dans le monde 7 employés en Suisse Dedié 100% à la sécurité des entreprises 100% Channel Business (no Direct Business) Systèmes Mobiles Chiffrement Web Réseaux 3
4 Sophos in Switzerland Andrej Massaro Country Manager Claudia Küng Sales Assistant Philip Cabinta (Wiesbaden) In-Sales Smallmarket Neslihan Cellek (Karlsruhe) Inside Sales NSG Michael Kretschmann Channel Sales Sascha Paris Pre-Sales Engineer Network Security TBD Key Account Manager French/Italian Yannick Escudero Pre-Sales Engineer Davide Di Pietro Account Manager MET
5
6 Sophos is leading the way In B2B security Security as an add-on to a platform - Point security Security portfolio Complete security without complexity Sophos Partner Connections 2012
7 Complete Security Tout ce dont vous avez besoin pour votre protection Endpoint Web Data Mobile Network Anti-malware Anti-malware Anti-malware Disk Encryption Anti-malware Unified Threat Management Firewall Intrusion prevention Malicious URL Filtering Anti-spam File encryption Mobile Control Secure branch offices Device Control Application Control Producttivity Filtering Data Control Key management Mobile app security WiFi security Access control Endpoint Web Protection Anonymising Proxy blocking encryption Device Control Web Application Firewall Encryption Patch Manager Content control Data Control archiving Data Control Virtualization HTTPS Scanning Encryption for cloud
8 Endpoint Complete Security Suites Launch 14 th May 2012
9 9 Price Price Legacy and current SKUs New portfolio (points) (points) SAV SBE 35/21 Sophos Anti-Virus - Business 40/32 Sophos Computer Security SBE 40/24 Sophos Endpoint Protection - Business 60/48 Sophos Security Suite SBE 61/37 Sophos Endpoint Protection - Advanced 100 Endpoint Protection - Basic 50 Sophos UTM Fullguard + UTM Endpoint Protection Endpoint Protection - Advanced 100 Sophos Web Protection Suite 130 Endpoint Protection - Enterprise 180 Sophos Data Protection Suite 130 Protection Suite Basic 130 Sophos Complete Security Suite 169/145 Protection Suite Advanced 200 Protection Suite Enterprise 240 Web Filtering add-on 20 Patch add-on 20 7SKUs Encryption add-on 60 Web Protection Suite 147 Web Security & Control 96 Security and Control 73 Security and Data Protection 95 Endpoint Security and Control 100 Endpoint Secuirty and Data Protection 120 Endpoint Groupware Security & Control 120 Endpoint Groupware Security & Data Protection 150 Enterprise Security and Control 174 Sophos Security and Data Protection 201 "Endpoint Secuirity & Control + Security & Control" 130 "Endpoint Secuirity & Control + Security & Data Protection" 146 "Endpoint Secuirity & Data Protection + Security & Data Protection" 161 "Endpoint Secuirity & Control + Web Security & Control" 147 "Endpoint Secuirity & Data Protection + Web Security & Control" 162 "Web Security & Control + Security & Control" 126 "Web Security & Control + Security & Data Protection" SKUs
10 Introducing Complete Security Complete Security Suite Data Protection Suite Web Protection Suite Endpoint Protection Advanced UTM Fullguard + UTM Endpoint (UTM 9) Endpoint Protection - Business Sophos Anti-Virus Business AV/HIP/Live Protection Client Firewall Application Control Device Control Web Filtering in Endpoint DLP, NAC, Patch Web Gateway Gateway Full-Disk Encryption Mobile UTM FullGuard* Groupware SharePoint, Exchange Exchange Exchange Exchange Exchange Platforms Win, Mac, Linux, Unix, VM, EMC Win, Mac, Linux, Unix, VM, EMC Win, Mac, Linux, Unix, VM, EMC Win, Mac, Linux, Unix, VM, EMC Win Win, Mac, Linux, VM, EMC Win, Mac, VM, 10 *UTM FullGuard includes network, web, , wireless and webserver protection
11 Pricing (Euro)
12 Network What comes next Sophos UTM Roadmap
13 Product rebranding Q1/Q Astaro Security Gateway 220 Astaro RED10 Astaro AP30 Sophos UTM 220 Sophos RED10 Sophos AP30 Redesign of Astaro Products: Change the look of Webadmin But only color, fonts and icons, not structural changes Change the look of the appliances (colors and logos) Licensing stays unchanged Integrate Sophos technology 13
14 Sophos UTM 9 - Roadmap Jan Feb Mar Apr May Jun Jul Aug Sep Oct Nov Dec Jan Feb Mar Apr May Jun UTM 9.0 UTM 9.1 UTM 9.2 UTM 9.0 GUI in Sophos Design SAV Integration UTM Endpoint Protection Device Control AV & HIPS Clientless SSL VPN Hotspot support UTM 9.1 Extended Endpoint Protection Web Filtering (policy sync.) Client Firewall (policy sync.) DLP Full Disk Encryption MAC OS support Extended Wireless Protection Repeater, Wireless IDS, Rogue AP detection UTM 9.2 Extended Endpoint Protection App.Ctrl (client/utm comm.) Device & Media Encryption VPN client UTM Mobile Control Remote Lock & Wipe Central App. Mgt. Access Mgt. 14
15 Partner Connections 2012 Partnering: The Added Value
16 Why Sophos partnering with Sophos
17 1. Complete Security
18 2. Commitment to Channel We re 100% channel and will always be
19 3. Continual investment in you What is new in 2012? 19
20 Our Partner Strategy How we win with our Partners Program Integration Margin Model Certifications & Enablement Engagement Model Incentives Strong Execution 20
21 Introducing the Partner Program Supporting a variety of business models Reseller Partners PLATINUM Solution Partners PLATINUM Pro GOLD GOLD Pro SILVER SILVER Pro 21
22 New Certification Levels Grouped by what partners need to know; minimize repetitive trainings 22
23 Significant Investment in Enablement Focused on educating you and the market 23
24 Increased Focus on Incentives Rewarding partners for performance 24
25 New Partner Portal Making it easier to do business with us 25
26 What s in it for you? Unique customer acquisition & retention opportunities with complete security portfolio Enhanced training and certification to expand your expertise in selling & servicing security Focused on self-service or all your sales, training and marketing needs Compelling margin structure with deal protection and new Plus Program Active engagement with Sophos local sales and product specialist teams Increased investment in marketing support to grow your customer base 26
27 Partner Connections 2012
Sophos Roadshow. Complete Security Vision
Sophos Roadshow Complete Security Vision Reconized leader Over 25 years of experience Data protection experts Global company with local presence 100 million users trust Sophos Reputation for highest quality
More informationDie neuen Sophos Suiten - Alles in einer Lizenz
Leading with Complete Security Die neuen Sophos Suiten - Alles in einer Lizenz Start ist um 10:00 Uhr vorher keine Tonübertragung Ihre heutigen Referenten Michael Veit Teamlead Sales Engineering Sophos
More informationSophos UTM Endpoint meets Gateway. Jonathan Hope Channel Manager Network Security UK & Ireland
Sophos UTM Endpoint meets Gateway Jonathan Hope Channel Manager Network Security UK & Ireland Sophos UTM Endpoint Web Email Data Mobile UTM Complete Security Sophos UTM Sophos complete security integrated
More informationComplex solutions aren t solutions. We make security for the real world for the pragmatic enterprise. Simple security is better security.
Complex solutions aren t solutions. We make security for the real world for the pragmatic enterprise. Simple security is better security. Kris Hagerman, CEO Sophos Simple security Strategy - Networks 3
More informationMcAfee Endpoint Protection Products
McAfee Total Protection Security Overview for MEEC Sumeet Gohri, CISSP Sr. Sales Engineer GovED + Healthcare McAfee, Inc. Agenda Protection Challenges McAfee Protection Products McAfee epo walkthrough
More informationIbrahim Yusuf Presales Engineer at Sophos ibz@sophos.com. Smartphones and BYOD: what are the risks and how do you manage them?
Ibrahim Yusuf Presales Engineer at Sophos ibz@sophos.com Smartphones and BYOD: what are the risks and how do you manage them? Tablets on the rise 2 Diverse 3 The Changing Mobile World Powerful devices
More informationEndUser Protection. Peter Skondro. Sophos
EndUser Protection Peter Skondro Sophos Agenda Sophos EndUser Solutions Endpoint Usecases Sophos Mobile Solutions Mobile Usecases Endpoint Sophos EndUser Solutions EndUser Protection AV Firewall Application
More informationAT&T Global Network Client for Windows Product Support Matrix January 29, 2015
AT&T Global Network Client for Windows Product Support Matrix January 29, 2015 Product Support Matrix Following is the Product Support Matrix for the AT&T Global Network Client. See the AT&T Global Network
More informationMove over, TMG! Replacing TMG with Sophos UTM
Move over, TMG! Replacing TMG with Sophos UTM Christoph Litzbach, Pre-Sales Engineer NSG 39 Key Features of TMG HTTP Antivirus/spyware URL Filtering HTTPS forward inspection Web Caching Role based access
More informationSimple security is better security Or: How complexity became the biggest security threat
Simple security is better security Or: How complexity became the biggest security threat Christoph Litzbach, Pre-Sales Engineer NSG 1 What do they have in common? DATA BREACH 2 Security is HARD! Components
More informationCOMPARISON OF FIXED & VARIABLE RATES (25 YEARS) CHARTERED BANK ADMINISTERED INTEREST RATES - PRIME BUSINESS*
COMPARISON OF FIXED & VARIABLE RATES (25 YEARS) 2 Fixed Rates Variable Rates FIXED RATES OF THE PAST 25 YEARS AVERAGE RESIDENTIAL MORTGAGE LENDING RATE - 5 YEAR* (Per cent) Year Jan Feb Mar Apr May Jun
More informationCOMPARISON OF FIXED & VARIABLE RATES (25 YEARS) CHARTERED BANK ADMINISTERED INTEREST RATES - PRIME BUSINESS*
COMPARISON OF FIXED & VARIABLE RATES (25 YEARS) 2 Fixed Rates Variable Rates FIXED RATES OF THE PAST 25 YEARS AVERAGE RESIDENTIAL MORTGAGE LENDING RATE - 5 YEAR* (Per cent) Year Jan Feb Mar Apr May Jun
More informationThe dramatic growth in mobile device malware. continues to escalate at an ever-accelerating. pace. These threats continue to become more
The dramatic growth in mobile device malware continues to escalate at an ever-accelerating pace. These threats continue to become more sophisticated while the barrier to entry remains low. As specific
More informationThe Next Level of Secure Channel Partnership
The Next Level of Secure Channel Partnership Copyright 2015 ADVANCED NETWORK SECURITY WatchGuard s Channel Ecosystem Is Focused, and the Opportunity for Engaged WatchGuardONE Partners Is Better Than Ever
More informationThe User is Evolving. July 12, 2011
McAfee Enterprise Mobility Management Securing Mobile Applications An overview for MEEC The User is Evolving 2 The User is Evolving 3 IT s Challenge with Mobile Devices Web 2.0, Apps 2.0, Mobility 2.0
More informationAnalysis One Code Desc. Transaction Amount. Fiscal Period
Analysis One Code Desc Transaction Amount Fiscal Period 57.63 Oct-12 12.13 Oct-12-38.90 Oct-12-773.00 Oct-12-800.00 Oct-12-187.00 Oct-12-82.00 Oct-12-82.00 Oct-12-110.00 Oct-12-1115.25 Oct-12-71.00 Oct-12-41.00
More informationSophos SG 1 Session: Sophos UTM
Sophos SG 1 Session: Sophos UTM 1 2 3 can be achieved complicated Router Firewall IPS SSL VPN Gateway E-Mail/Spam Filter GW Antiviren-Filter Web-Filter WAN Link Balancer Load Balancer 4 or simple 5 Our
More informationToday's security needs in networking
Today's security needs in networking Besoins actuels de la sécurité réseau European partner summit Thursday, October 13, 2005 Hervé Schauer Hervé Schauer Agenda Firewalls Liability
More informationCase 2:08-cv-02463-ABC-E Document 1-4 Filed 04/15/2008 Page 1 of 138. Exhibit 8
Case 2:08-cv-02463-ABC-E Document 1-4 Filed 04/15/2008 Page 1 of 138 Exhibit 8 Case 2:08-cv-02463-ABC-E Document 1-4 Filed 04/15/2008 Page 2 of 138 Domain Name: CELLULARVERISON.COM Updated Date: 12-dec-2007
More informationBoston Area Windows Server User Group April 2010
Boston Area Windows Server User Group April 2010 Hey Jack, don t you have a new job? Yes, unbelievably, my job is better than ever. After working in our outstanding Support Engineering team for the past
More informationIntroducing KASPERSKY ENDPOINT SECURITY FOR BUSINESS.! Guyton Thorne! Sr. Manager System Engineering! guyton.thorne@kaspersky.com
Introducing KASPERSKY ENDPOINT SECURITY FOR BUSINESS! Guyton Thorne! Sr. Manager System Engineering! guyton.thorne@kaspersky.com 1 Business drivers and their impact on IT AGILITY! Move fast, be nimble
More informationSecure Your Mobile Workplace
Secure Your Mobile Workplace Sunny Leung Senior System Engineer Symantec 3th Dec, 2013 1 Agenda 1. The Threats 2. The Protection 3. Q&A 2 The Mobile Workplaces The Threats 4 Targeted Attacks up 42% in
More informationSophos Acquires Cyberoam
Sophos Acquires Cyberoam Frequently Asked Questions Table of Contents FAQ... 2 What is Sophos announcing?... 2 Who is Cyberoam?... 2 Why is Sophos acquiring Cyberoam?... 2 Why is Sophos acquiring Cyberoam
More informationYour Security Partner of Choice
Your Security Partner of Choice 6/16/14 2 About WatchGuard 100% CHANNEL 5,000 partners in 120 countries Ø Firewall appliance pioneer Ø Nearing 1,000,000 appliances shipped to business customers worldwide
More informationSophos Certified Architect Course overview
Sophos Certified Architect Course overview UTM This course provides an in-depth study of UTM, designed for experienced technical professionals who will be planning, installing, configuring and supporting
More informationEnhanced Vessel Traffic Management System Booking Slots Available and Vessels Booked per Day From 12-JAN-2016 To 30-JUN-2017
From -JAN- To -JUN- -JAN- VIRP Page Period Period Period -JAN- 8 -JAN- 8 9 -JAN- 8 8 -JAN- -JAN- -JAN- 8-JAN- 9-JAN- -JAN- -JAN- -JAN- -JAN- -JAN- -JAN- -JAN- -JAN- 8-JAN- 9-JAN- -JAN- -JAN- -FEB- : days
More informationAn Introduction to Commulynx
An Introduction to Commulynx Commulynx Key Team Members Commulynx has 17 people in our team, however the key people are as follows: Stephen Knights the founder and Managing Director with over 20 years
More informationAgriLife Information Technology IT General Session January 2010
AgriLife Information Technology IT General Session January 2010 Agenda Topics Year in Review Enterprise IT Services Update FirstCall Overview and Next Steps Sophos Antivirus Initiative Update Information/
More informationNext Gen Firewall and UTM Buyers Guide
Next Gen Firewall and UTM Buyers Guide Implementing and managing a network protected by point solutions is far from simple. But complete protection doesn t have to be complicated. This buyers guide explains
More informationAstaro Gateway Software Applications
Astaro Overview Astaro Products - Astaro Security Gateway - Astaro Web Gateway - Astaro Mail Gateway - Astaro Command Center - Astaro Report Manager Astaro Gateway Software Applications - Network Security
More informationNetwork Security. Intertech Associates, Inc.
Network Security Intertech Associates, Inc. Agenda IT Security - Past to Future Security Vulnerabilities Protecting the Enterprise What do we need in each site? Requirements for a Security Architecture
More informationKaspersky Security for Business
Kaspersky Security for Business Licensing Program Renewals and Upgrades: A Migration Guide Introducing Kaspersky s Security for Business software licensing program. Table 1: Renew and Upgrade to Increased
More informationKASPERSKY SECURITY FOR BUSINESS
KASPERSKY SECURITY FOR BUSINESS Licensing Program RENEWALS AND UPGRADES: A Migration Guide INTRODUCING KASPERSKY S SECURITY FOR BUSINESS SOFTWARE LICENSING PROGRAM. Kaspersky s latest endpoint release
More informationSophos is a Network Security company too
Never mind the Endpoint Sophos is a Network Security company too Chris Weeds, Director Product Marketing and Greg Iddon, Sales Engineer October 2015 1 NEVER MIND THE ENDPOINT HERE S SOPHOS SOPHOS IS A
More informationBUSINESS OPPORTUNITY 4 CONNECTED UTM FOR SMALL OFFICES 6 SECURE COMMUNICATIONS FOR SMALL OFFICES 10 COMPETITIVE COMPARISONS 15
SMB Partner Sales Guide 1 Contents BUSINESS OPPORTUNITY 4 CONNECTED UTM FOR SMALL OFFICES 6 SECURE COMMUNICATIONS FOR SMALL OFFICES 10 COMPETITIVE COMPARISONS 15 FORTIGUARD SECURITY SERVICES 18 PARTNER
More informationUnified Threat Management, Managed Security, and the Cloud Services Model
Unified Threat Management, Managed Security, and the Cloud Services Model Kurtis E. Minder CISSP Global Account Manager - Service Provider Group Fortinet, Inc. Introduction Kurtis E. Minder, Technical
More information5 Considerations for a Successful BYOD Strategy Vincent Vanbiervliet
5 Considerations for a Successful BYOD Strategy Vincent Vanbiervliet Sr. Sales Engineer 1 What we ll talk about What is BYOD? Mobile Revolution, the Post PC era? BYOD: What to consider 1. Users 2. Devices
More informationHow To Get A Certificate From Ms.Net For A Server Server
Last Activity Recorded : December 19, 2014 Microsoft Certification ID : 2665612 MARC GROTE Wittorfer Strasse 4 Bardowick, Lower Saxony 21357 DE grotem@it-training-grote.de ACTIVE MICROSOFT CERTIFICATIONS:
More informationZscaler Cloud Web Gateway Test
Zscaler Cloud Web Gateway Test A test commissioned by Zscaler, Inc. and performed by AV-TEST GmbH. Date of the report: April15 th, 2016 Executive Summary In March 2016, AV-TEST performed a review of the
More informationTMG Replacement Guide
Your guide to replacing Microsoft Forefront Threat Management Gateway By Chris McCormack, Senior Product Marketing Manager and Angelo Comazzetto, UTM Product Manager During one of the most active periods
More informationU.S. Department of Energy Golden Field Office Information Technology. GOanywhere Real World Virtual Desktops in the DOE
Information Technology GOanywhere Real World Virtual Desktops in the DOE Agenda 1. Brief Intro to the 2. VDI Drivers and Architecture 3. Lessons Learned 4. Benefits of VDI 5. Follow-On Initiatives About
More informationAgenda. John Veldhuis, Sophos The playing field Threats Mobile Device Management. Pagina 2
Mobile Security Agenda John Veldhuis, Sophos The playing field Threats Mobile Device Management Pagina 2 The Changing Mobile World Powerful devices Access everywhere Mixed ownership User in charge Powerful
More informationNetwork protection and UTM Buyers Guide
Network protection and UTM Buyers Guide Using a UTM solution for your network protection used to be a compromise while you gained in resource savings and ease of use, there was a payoff in terms of protection
More informationNATIONAL GATEWAY SECURITY SURVEY
NATIONAL GATEWAY SECURITY SURVEY REPORT SUMMARY The National Gateway Security Survey 2008 was carried out for value added distributor Wick Hill, specialists in secure infrastructure solutions, and sponsored
More informationACTIVE MICROSOFT CERTIFICATIONS:
Last Activity Recorded : August 30, 2012 Microsoft Certification ID : 30999 BERT VAN HOVE BARON EMPAINLAAN 68 MECHELEN, 2800 BE bert@road2result.be ACTIVE MICROSOFT CERTIFICATIONS: Microsoft Certified
More information10 Strategies to Optimize IT Spending in an Economic Downturn. Wong Kang Yeong, CISA, CISM, CISSP Regional Security Architect, ASEAN
10 Strategies to Optimize IT Spending in an Economic Downturn Wong Kang Yeong, CISA, CISM, CISSP Regional Security Architect, ASEAN Current Economic Landscape 2 Basically you Basically you ve had to throw
More informationSOFTWARE DEFINED SOLUTIONS JEUDI 19 NOVEMBRE 2015. Nicolas EHRMAN Sr Presales SDS
SOFTWARE DEFINED SOLUTIONS JEUDI 19 NOVEMBRE 2015 Nicolas EHRMAN Sr Presales SDS Transform your Datacenter to the next level with EMC SDS EMC SOFTWARE DEFINED STORAGE, A SUCCESS STORY 5 ÈME ÉDITEUR MONDIAL
More informationWeb Security Update. A Radicati Group, Inc. Webconference. The Radicati Group, Inc. Copyright March 2010, Reproduction Prohibited
The Radicati Group, Inc. www.radicati.com Web Security Update A Radicati Group, Inc. Webconference The Radicati Group, Inc. Copyright March 2010, Reproduction Prohibited 9:30 am, PT March 25, 2010 Speakers
More informationFY15 PartnerOne IT Management, Vertica and Autonomy Applicable Nov 1
FY15 PartnerOne IT Management, Vertica and Autonomy Applicable Nov 1 New Certifications releasing Launch_Date_GA Dev_Stat us Level_C red Credential_Title Job_Role Replaced_Certification HP ASE - Operations
More informationACTIVE MICROSOFT CERTIFICATIONS:
Last Activity Recorded : May 30, 2014 Microsoft Certification ID : 375009 SUSANNE SCHNEIDER KAISERSTRASSE 53 REUTLINGEN, 72764 DE SUSANNE.SCHNEIDER@KIT-KOM.DE *Charter- Certification that was achieved
More informationAstaro Security Gateway V7 Active/Active-Cluster Licensing Partner FAQ
Active/Active-Cluster Licensing Partner FAQ Author: Udo Kerst (uke) Date: 2007-05-11 Content Page Which applications are being load balanced within an Astaro Security Gateway cluster?...2 Which licenses
More informationIMPACT PARTNER PROGRAM
IMPACT PARTNER PROGRAM VAULTIZE IMPACT PARTNER PROGRAM Security Efficiency Control Dear Partner, By joining the Vaultize Impact partner program, your company benefits from the industry s leading enterprise-grade
More informationSimplifying branch office security
Simplifying branch office security By Udo Kerst, Director Product Management Network Security Securing your business network is more important than ever. Malware, botnets and other malicious programs threaten
More informationBYOD: End-to-End Security
BYOD: End-to-End Security Alen Lo MBA(CUHK), BSc(HKU), CISA, CCP, CISSP, CISM, CEH IRCA Certified ISMS Lead Auditor, itsmf ISO 20000 Auditor Principal Consultant i-totalsecurity Consulting Limited alenlo@n2nsecurity.com
More informationConfidence in a Connected World. MEEC Symantec Product Availability. John Lally MD Education Account Executive 204-401-7342 John_Lally@symantec.
Confidence in a Connected World MEEC Symantec Product Availability John Lally MD Education Account Executive 204-401-7342 John_Lally@symantec.com 1 Agenda New threats means advanced security tactics SEP
More informationFortigate Features & Demo
& Demo Prepared and Presented by: Georges Nassif Technical Manager Triple C Firewall Antivirus IPS Web Filtering AntiSpam Application Control DLP Client Reputation (cont d) Traffic Shaping IPSEC VPN SSL
More informationSophos Cloud and Partner Dashboard Jonathan Shaw
Sophos Cloud and Partner Dashboard Jonathan Shaw Product Manager, Sophos Cloud Agenda 1) An introduction to Sophos Cloud 2) Recent updates to Sophos Cloud 3) The new partner dashboard 4) What s coming
More informationAshley Institute of Training Schedule of VET Tuition Fees 2015
Ashley Institute of Training Schedule of VET Fees Year of Study Group ID:DECE15G1 Total Course Fees $ 12,000 29-Aug- 17-Oct- 50 14-Sep- 0.167 blended various $2,000 CHC02 Best practice 24-Oct- 12-Dec-
More informationA Manager s Guide to Unified Threat Management and Next-Gen Firewalls
A Manager s Guide to Unified Threat Management and Next-Gen Firewalls Key factors to justify and evaluate UTM and NGFW systems By Udo Kerst, Director Product Management, Network Security and Barbara Hudson,
More informationOverview and Deployment Guide. Sophos UTM on AWS
Overview and Deployment Guide Sophos UTM on AWS Overview and Deployment Guide Document date: November 2014 1 Sophos UTM and AWS Contents 1 Amazon Web Services... 4 1.1 AMI (Amazon Machine Image)... 4 1.2
More informationWin the Internet Security War. Keep Internet Criminals Out of Your Network and Protect Your Business
Win the Internet Security War Keep Internet Criminals Out of Your Network and Protect Your Business Takeaways Cyber-criminals are using emails & social engineering to infiltrate your network Your team
More informationPROTECTION SERVICE FOR BUSINESS WELCOME TO THE BUSINESS OF FREEDOM
PROTECTION SERVICE FOR BUSINESS WELCOME TO THE BUSINESS OF FREEDOM EMPLOYEES WORK ON THE MOVE, WITH MULTIPLE DEVICES MEETING CUSTOMERS WORKING FROM HOME BUSINESS TRIP CLOUD SERVICES ARE ENABLERS OF MOBILE
More information10 Key Things Your VoIP Firewall Should Do. When voice joins applications and data on your network
10 Key Things Your Firewall Should Do When voice joins applications and data on your network Table of Contents Making the Move to 3 10 Key Things 1 Security is More Than Physical 4 2 Priority Means Clarity
More informationGoverning Board Memorandum
Governing Board Memorandum February 19, 2015 Agenda Item 10: Recommended Action: Progress Report on the 2015 CEA IT Project Portfolio No action required information only Chief Information Officer Todd
More informationMobile Security: The good, the bad, the way forward
Mobile Security: The good, the bad, the way forward Get the most out of HP s Mobility Protection Services Jan De Clercq, Felix Martin, HP TC, December, 2013 Today s Presenter Name Jan De Clercq Title &
More informationReady for your slice of that sweet data protection revenue?
New Generation Data Protection Powered by the Acronis AnyData Engine Ready for your slice of that sweet data protection revenue? Markus Galler Sr. Director Cloud Services WHD.Local Frankfurt September
More informationLong Live Hosting! Use Solution-based Offers to Re-position Your Business and Reach New Audiences. 2014 Parallels IP Holdings GmbH
Long Live Hosting! Use Solution-based Offers to Re-position Your Business and Reach New Audiences 2014 Parallels IP Holdings GmbH 2 3 4 300K New Webservers were added in 2013 350000 300000 250000 200000
More informationOUR MISSION IS TO PROTECT EVERYONE FROM CYBERCRIME
OUR MISSION IS TO PROTECT EVERYONE FROM CYBERCRIME We believe that everyone from home computer users and small companies, to large corporations and governments has the right to be free from cybersecurity
More informationCheck Point Positions
Check Point Positions - Gartner Magic Quadrants - IDC Market Share Research 2012 Dean J. Whitehair Analyst Relations October 2012 Version 9.0 Updated 10/17/2012 2012 Check Point Software Technologies Ltd.
More informationTravaux publics et Services gouvernementaux Canada. Title - Sujet RFSA FOR THE PROVISION OF SOFTWARE. Solicitation No. - N de l'invitation
Public Works and Government Services Canada RETURN BIDS TO: RETOURNER LES SOUMISSIONS À: Bid Receiving - PWGSC / Réception des soumissions - TPSGC 11 Laurier St. / 11, rue Laurier Place du Portage, Phase
More informationWatchGuard: Your Security Partner of Choice. Carlos Vieira
WatchGuard: Your Security Partner of Choice Carlos Vieira About WatchGuard Over a decade of security expertise Security is our sole focus Firewall appliance pioneer Headquartered in Seattle, WA Offices
More informationGabriel Coimbra Research & Consulting Director IDC Portugal. Porto, 29 de Maio 2008. www.idc.com
IT Security Market Overview Gabriel Coimbra Research & Consulting Director IDC Portugal Porto, 29 de Maio 2008 www.idc.com Agenda Market context IT Security context CSO Agenda IT Security market Conclusion
More informationHow To Understand Your Potential Customer Opportunity Profile (Cop) From A Profit Share To A Profit Profit (For A Profit)
IT Services Qualifying & COP Form Training April 2011 1 Agenda Purpose for the COP Form & How it Should Be Used Customer Opportunity Profile (COP) Form Identifying Virtualization Opportunities Identifying
More informationCopyright 2013 WatchGuard Technologies, Inc. All rights reserved. Introducción a Watchguard DLP Data Loss Prevention
Copyright 2013 WatchGuard Technologies, Inc. All rights reserved. Introducción a Watchguard DLP Data Loss Prevention About WatchGuard > Taken private in 2006; enabled strategic shift > Firewall appliance
More informationWorkshop. Avril 2015 Benoit Buonassera benoitb@checkpoint.com 06 72 94 19 98
Workshop Avril 2015 Benoit Buonassera benoitb@checkpoint.com 06 72 94 19 98 BE YOUR CUSTOMER S BEST ADVISOR By using the Security Checkup tool you will increase your business opportunities while bringing
More informationDeep Security Vulnerability Protection Summary
Deep Security Vulnerability Protection Summary Trend Micro, Incorporated This documents outlines the process behind rules creation and answers common questions about vulnerability coverage for Deep Security
More informationWebsense Solutions. TRITON v7.7 Architecture
Websense Solutions TRITON v7.7 Architecture Unified Platform Unified architecture Unified security intelligence Unified console Unified policy & reporting TRITON Architecture Solution Stacks for v7.7
More informationProtect Yourself in the Cloud Age
Protect Yourself in the Cloud Age Matthew Wu Consultant Hong Kong Computer Emergency Response Team Coordination Centre About HKCERT HKCERT ( 香 港 電 腦 保 安 事 故 協 調 中 心 ) Established in 2001 Funding & Operation
More informationFeature List for Kaspersky Security for Mobile
Feature List for Kaspersky Security for Mobile Contents Overview... 2 Simplified Centralized Deployment... 2 Mobile Anti-Malware... 3 Anti-Theft / Content Security... Error! Bookmark not defined. Compliance
More informationCisco & Big Data Security
Cisco & Big Data Security 巨 量 資 料 的 傳 輸 保 護 Joey Kuo Borderless Networks Manager hskuo@cisco.com The any-to-any world and the Internet of Everything is an evolution in connectivity and collaboration that
More informationReacting to the Challenges: Business Strategies for Future Success. Todd S. Adams, Chief Executive Officer Adams Bank & Trust Ogallala, Nebraska
Reacting to the Challenges: Business Strategies for Future Success Todd S. Adams, Chief Executive Officer Adams Bank & Trust Ogallala, Nebraska Adams Bank & Trust Family Owned for 95 Years $525 Million
More informationACTIVE MICROSOFT CERTIFICATIONS:
Last Activity Recorded : August 04, 2011 Microsoft Certification ID : 483228 KENT NORDSTROM Asbergsvagen 27 Soderhamn, 82637 SW kent@xpservices.se ACTIVE MICROSOFT CERTIFICATIONS: Microsoft Certified Solutions
More informationAstaro Security Gateway V8. Remote Access via SSL Configuring ASG and Client
Astaro Security Gateway V8 Remote Access via SSL Configuring ASG and Client 1. Introduction This guide contains complementary information on the Administration Guide and the Online Help. If you are not
More informationCENTERPOINT ENERGY TEXARKANA SERVICE AREA GAS SUPPLY RATE (GSR) JULY 2015. Small Commercial Service (SCS-1) GSR
JULY 2015 Area (RS-1) GSR GSR (LCS-1) Texarkana Incorporated July-15 $0.50690/Ccf $0.45450/Ccf $0.00000/Ccf $2.85090/MMBtu $17.52070/MMBtu Texarkana Unincorporated July-15 $0.56370/Ccf $0.26110/Ccf $1.66900/Ccf
More informationOur Services are just not less than a Magic
Our Services are just not less than a Magic Technofirm Software is a Leading License Software Solution Company. Established in Year 2000. Mainly Focused in major License Software solution, implementation,
More informationHigh Performance NGFW Extended
High Performance NGFW Extended Enrique Millán Country Manager Colombia emillan@fortinet.com 1 Copyright 2013 Fortinet Inc. All rights reserved. D I S C L A I M E R This document contains confidential material
More informationEMC Software Release and Service Dates for NetWorker and NetWorker Modules Last Updated on February 21, 2013
EMC Software Release and Service Dates for NetWorker and NetWorker Modules Last Updated on February 21, 2013 This report provides information about software releases, including release dates, any announced
More informationSimplifying Branch Office Security
Simplifying Branch Office Security By Udo Kerst, Director Product Management Network Security It is more important than ever to secure your business. Malware, botnets and other malicious programs threaten
More informationRequired Software Product List
Symantec ($3.2 million, 35% weight) AdVantage AdvisorMail AntiVirus (Endpoint Protection) AntiVirus Enterprise Edition App Center Application HA Asset Management Suite Backup Exec Certificate Intelligence
More informationDid you know your security solution can help with PCI compliance too?
Did you know your security solution can help with PCI compliance too? High-profile data losses have led to increasingly complex and evolving regulations. Any organization or retailer that accepts payment
More informationSpine Warranted Environment Specification
Spine Warranted Environment Specification 2015 Richard Trusson June 2015 1 Copyright 2015, Health and Social Care Information Centre. Contents Introduction 3 Scope 3 Intended Audience 4 Approach 4 Changes
More information- DLP Des nuages. à la terre ferme
- DLP Des nuages à la Paris, 23 Novembre 2010 Agenda Notion de Data Leak Prevention Retour sur le Cloud Mesures de sécurité spécifiques au Cloud Quel est la nécéssité du DLP dans le Cloud? DLP dans le
More informationThe Future of Network Security Sophos 2012 Network Security Survey
The Future of Network Security Sophos 2012 Network Security Survey Sophos and Vanson Bourne surveyed 571 IT decision makers globally to gain a deeper understanding of how IT teams are responding to technology
More informationSSL... 2 2.1. 3 2.2. 2.2.1. 2.2.2. SSL VPN
1. Introduction... 2 2. Remote Access via SSL... 2 2.1. Configuration of the Astaro Security Gateway... 3 2.2. Configuration of the Remote Client...10 2.2.1. Astaro User Portal: Getting Software and Certificates...10
More informationExternal authentication with Astaro AG Astaro Security Gateway UTM appliances Authenticating Users Using SecurAccess Server by SecurEnvoy
External authentication with Astaro AG Astaro Security Gateway UTM appliances Authenticating Users Using SecurAccess Server by SecurEnvoy Contact information SecurEnvoy www.securenvoy.com 0845 2600010
More informationCenters of Academic Excellence in Cyber Security (CAE-C) Knowledge Units Review
Centers of Academic Excellence in Cyber Security (CAE-C) Knowledge Units Review Review Process The Knowledge Unit (KU) Review Calendar divides the entire CAE-C KU list into 12 months for the purposes of
More informationResource Management Spreadsheet Capabilities. Stuart Dixon Resource Manager
Resource Management Spreadsheet Capabilities Stuart Dixon Resource Manager Purpose Single view of resource data Shows rolling demand vs supply for 14 months, 2 months back, current month, and 11 forward
More informationEMC Software Release and Service Dates for NetWorker and NetWorker Modules Last Updated on August 16, 2012
EMC Software Release and Service Dates for NetWorker and NetWorker Modules Last Updated on August 16, 2012 This report provides information about software releases, including release dates, any announced
More informationService/Description RACER Part Number MSS Part Number MSRP
Managed Security Services Managed E-Mail Content Monthly Recurring Charges Single Services Two Services Three Services Four Services Non-recurring Charges Managed Web Content Monthly Recurring Charges
More informationTRENDS IN THE THREAT LANDSCAPE
TRENDS IN THE THREAT LANDSCAPE Guy Eilon, SEE Regional Manager April 2013 geilon@websense.com TRITON STOPS MORE THREATS. WE CAN PROVE IT. 2013 Websense, Inc. Page 1 CHANGING CUSTOMERS NEEDS 90% of companies
More information